AP CSP vocab and crap Flashcards
a heuristic process may include running tests and getting results by
trial and error
the goal of heuristics is to develop a simple process that generates … (or …) results in an …
accurate; approximate; acceptable amount of time
digital certificate is the same thing as
public key certificate
a digital certificate is an electronic … that allows a person, computer, or organization to exchange information securely over the Internet using the
public key infrastructure (PKI)
a digital certificate provides …., is … resistant and can be … because it was issued by an …, … agency
contains the name of the certificate holder, a … number, … dates, a copy of the certificate holder’s … and the … of the certificate-issuing authority
identifying information; forgery; verified; official, trusted; serial; expiration; public key; digital signature
append: to add at the
end
DNS Subdomain: hostname that belongs to your domain
e.g.
about.example.com
selection: a generic term for a type of programming statement (usually an if-statement) that uses a … condition to determine/select whether or not to run a …
Boolean; certain block of statements
iterate: to … in order to achieve, or get closer to, a desired goal
repeat
bitmap: an array of … representing the values of … in an image/display
binary data; pixels
floating-point number:
a real number
statement: directs the computer to perform a …
specified action
expression: a group of …. that represent a
symbols; value
procedure: a set of coded instructions that tell a computer how to
run a program/calculation
protocols: a set of rules governing the … or … of data between devices
exchange; transmission
stepwise refinement: a top-down process in which the programmer starts with the … of the program and continually … into …
overall goal; breaks down the design; sub-functions
transistor: a device used to amplify its …, a … switch and the fundamental building block of ..
electrical input; binary; computer circuitry
motherboard: holds together the …, … and … for … and … devices
CPU; memory; connectors; input; output
procedural abstraction: … model of what we want a subprogram to do
mental
data abstraction: the reduction of a particular body of data to a
simplified representation of the whole
expression: any valid unit of code that resolves to a
value
network switch: computer networking device that connects … on a … by using packet switching to receive, process, and forward data to the destination device
devices together; computer network
chip can store … or provide …
computer memory; logic circuitry
Open Systems Interconnection (OSI model) is a conceptual model that characterizes and standardizes the … functions of a telecommunication or computing system without regard to its underlying … and …
communication; internal structure; technology
privatization is the process of transferring an enterprise or industry from the … to the …
public sector; private sector
cryptography is the science of … by transforming it into a secure format. It is used to protect …
protecting information; digital data
virus: a type of malicious software program that, when executed, replicates itself by modifying other … and inserting its own…
computer programs; code
major characteristics of viruses: the ability to … itself, and the ability to …. to another …
replicate; attach itself; computer file
a computer virus needs another … in order to be able to be activated and infect other computer files. essentially, a computer virus piggybacks on another file in your computer
program
phishing: a thief trying to trick you into sending them … Typically these include … about … asking you to send your … and …, … or other things
sensitive information; emails; system updates; username; password; social security number
symmetric encryption: a form of computerized cryptography using a singular … to guise an …
its data conversion uses a mathematical algorithm along with a …, which results in the inability to …
encryption key; electronic message; secret key; make sense out of a message
public key encryption: used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, … It uses an … in which the encryption key is made …, but the decryption key is kept …
a secret key; asymmetric encryption scheme; public; private
vigenere cipher: a method of encrypting alphabetic text by using a series of interwoven … based on the letters of a …
Caesar ciphers; keyword
certificate authority: a trusted entity that issues … that verify a … on the Internet
essential part of secure communication and play an important part in the public key infrastructure
electronic documents; digital entity’s identity
trust model of the internet: users must … if they want them to do anything useful on their computers
trust applications
open standards: standards made available to the … and are developed (or approved) and maintained via a … and … driven process
general public; collaborative; consensus
distributed denial of service (DDoS) attack: occurs when … flood the bandwidth/resources of a targeted system, usually one or more … –> often the result of multiple …
multiple systems; web servers; compromised systems
denial of service (DOS): an interruption in an authorized user’s …, typically one caused with malicious intent
access to a computer network
404 error: website’s server could not find the … requested by the user
URL
DNS spoofing: a type of computer attack wherein a user is forced to navigate to a … disguised to look like a real one, with the intention of diverting … or stealing .. of the users
fake website; traffic; credentials
firewall: software that runs on … (often …) that only allows traffic through according to some set of …
servers; routers; security rules
DNS: the service that translates … to …
URLs; IP addresses
sequencing: putting commands in … so computers can …
correct order; read the commands
network redundancy: having multiple … to ensure … during cases of … or …
backups; reliability; high usage; failure
Internet Engineering Task Force (IETF): develops and promotes … Internet … and … in particular, the standards that comprise the … (…/…)
voluntary; standards; protocols; Internet protocol suite (TCP/IP)
top-level domain: last segment of the domain name, the part that follows immediately after the
dot symbol
metadata: data that … other data. For example, a digital image may include metadata that describe the … of the image, number of …, or ….
describes; size; colors; resolution
packets: small chunks of information that have been carefully formed from
larger chunks of information
packet: contains the … and …in addition to the data
destination address; origin address
machine learning: a field of computer science that uses … techniques to give computer systems the ability to … with data, without being explicitly programmed
statistical; learn
low-level programming language provides little/no … from a computer’s instruction set architecture and generally refers to either … or …
abstraction; machine code; assembly language
high-level language: enables a programmer to write programs that are more or less … of a particular … –> closer to …
independent; type of computer; human languages
innovation: a new/improved …, …, …, etc, or the … thereof
idea; device; product; development
binary: a way of representing information using only
two options
bit: a contraction of …, the single unit of information in a computer, typically represented as a … or …
binary digit; 0; 1
bandwidth: … measure by …
transmission capacity; bit rate
bit rate: the number of … that are conveyed or processed per …
bits; unit of time
latency: time it takes for a bit to
travel from its sender to its receiver
ASCIII: American Standard Code for Information Interchange; the universally recognized … that any computer can understand
raw text format
internet: a group of … and … that are connected to each other
computers; servers
net neutrality: the principle that all Internet traffic should be … by Internet Service Providers
treated equally
IP Address: a number assigned to any … that is connected to the internet
item
router: a type of computer that
forwards data across a network
Transmission Control Protocol (TCP): provides …, …, and … delivery of a stream of … on the internet. Tightly linked with …
reliable; ordered; error-checked; packets; IP
HyperText Transfer Protocol (HTTP): the protocol used for … over the Internet
transmitting web pages
URL: an easy-to-remember address for calling a
web page
lossless compression: a data compression algorithm that allows the original data to be perfectly
reconstructed from the compressed data
pixel: short for picture element, the fundamental unit of a …, typically a tiny square/dot that contains a single point of color of a larger image
digital image
RGB: the RGB color model uses varying intensities of Red, Green, and Blue light that are added together to reproduce a
broad array of colors
lossy compression (irreversible compression): a data compression method that uses …, discarding some data to represent the … Most commonly seen in image formats like …
inexact approximations; content; .jpg
abstraction: a simplified representation of something more …. allow you to hide details to help you manage …, focus on …., and reason about problems at a …
complex; complexity; relevant concepts; higher level
pivot table: name of the tool used to create
summary tables
summary table: a table that shows the results of aggregations performed on data from a …, hence a “…” of larger data
larger data set; summary
algorithm: a precise sequence of instructions for processes that can be
executed by a computer
turtle programming: a classic method for learning programming with commands to control … and … of an on-screen robot called a ..
movement; drawing; turtle
function: a named group of …; reusable … that reduce the complexity of … and … programs
programming instructions; abstractions; writing; maintaining
API: a collection of … made available to a programmer
commands
documentation: a description of the behavior of a …, …, …, ….
command; function; library; API
library: a collection of …/…, typically with a … purpose
command; functions; shared
parameter: an extra piece of information passed to a function to customize it for a
specific need
loop: the action of doing something
over and over again
for loop: loops that have a predetermined …, …, and …
beginning; end; increment
big data: a broad term of datasets so … or … that traditional data processing applications are …
large; complex; inadequate
moore’s law: a predication made by Moore in 1965 that computing power will … every 1.5-2 years, it has remained more or less true
double
caesar cipher: a technique for encryption that shifts the alphabet by some
number of characters
cracking encryption: when you attempt to decode a secret message without knowing all the …, you are trying to “crack” the encryption
specifics of the cipher
decryption: a process that reverses …, taking a secret message and reproducing the original plain text
encryption
encryption: a process of … to keep them secret, so only “authorized” parties can read it
encoding messages
random substitution cipher: a process of encoding messages to keep them …, so only … can read it
secret; authorized parties
computationally hard: a hard problem for a computer is one in which it cannot arrive at a … in a …
solution; reasonable amount of time
assymetric encryption: used in public key encryption, it is scheme in which the key to encrypt data is different from the
key to decrypt
modulo: a mathematical operation that returns the
remainder after integer division (MOD)
private key: in an assymetric encryption scheme the decryption key is kept … and never shared, so only the intended recipient has the ability to … a message that has been encrypted with a public key
secret; decrypt
antivirus software: usually keeps big … of … and … your computer looking for the virus programs in order to get rid of them
lists; known viruses; scans
SSL/TLS (Secure sockets layer/ transport layer security): an encryption layer of HTTP that uses …. to establish a …
public key cryptography; secure connection
callback function: a function specified as part of an …; it is written by the … but called by the … as the result of an …
event listener; programmer; system; event trigger
event-driven program: a program designed to run blocks of code/functions in response to
specified events
event handling: an overarching term for the coding tasks involved in making a program
respond to events by triggering functions
event listener: a command that can be set up to trigger a function when a particular type of event occurs on a
particular UI element
UI element: …, like buttons, images, text boxes, pull down menus, screens and so on
on-screen objects
User Interface: the … elements of a program through which a user … or … with the application (UI)
visual; controls; communicates
debugging: … and … problems in an algorithm or program
finding; fixing
==
the equality operator
global variable: a variable whose scope is … to the …, it can be used and updated by … of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method
global; program; any part of the code
fixed variable: a variable that remains
constant
local variable: a variable with local scope is one that can only be seen, used, and updated by code within … Typically this means the variable was declared inside a …–includes function …
the same scope; function; parameter variables
variable scope: dictates which portions of the code can “…” or … a variable, typically derived from where the variable was first
see; use; created
concatenate: to … or … Typically used when … in programming
link together; join; joining together text Strings
String: any sequence of characters between
quotation marks
conditionals: statements that only run under
certain conditions
models and simulations: a program which replicates or mimics key features of a real world event in order to investigate its behavior without the …, …, or … of running an experiment in real life
cost; time; danger
array: a … in JavaScript used to represent a …
data structure; list
list: a generic term for a programming data structure that
holds multiple items
Key Event: in JavaScript an event triggered by … or … a … on the …
pressing; releasing; key; keyboard
return value: a value sent back by a function to the place in the code where the function was …- typically asking for … or the result of a … or …. of some kind. Most programming languages have many built-in functions that return values, but you can also write your own
called from; value; calculation; computation
canvas: a user interface element to use in HTML/JavaScript which acts as a …, allowing the programmatic … and manipulation of …, …., … and …
digital canvas; drawing; pixels; basic shapes; figures; images